Security Vigilance Never Rests: Moving to Active Threat Detection

By TK Keanini Few things are as dynamic as cybersecurity. Modern networks have become increasingly sophisticated and complex. Today’s network extends to myriad devices fueled by a mobile workforce and more organizations are

Source:: Cisco Security Notice

Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach

By Jeff Fawcett The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.

Source:: Cisco Security Notice

Support:V6 Firmware End of Life

Source:: Innovaphone

Vulnerability Spotlight: Multiple privilege escalation vulnerabilities in CleanMyMac X

By Talos Group Tyler Bohan of Cisco Talos discovered these vulnerabilities. Executive summary Today, Cisco Talos is disclosing several vulnerabilities in MacPaw’s CleanMyMac X software. CleanMyMac X is a cleanup application for Mac

Source:: Cisco Security Notice

Threat Roundup for Dec. 14 to Dec. 21

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Dec. 14 and Dec. 21. As with previous roundups, this post isn’t meant to be an

Source:: Cisco Security Notice

Submissions for talks at the 2019 Talos Threat Research Summit are now open

By Talos Group Cisco Talos is happy to announce that the Talos Threat Research Summit is returning in 2019. This time, we are expanding the number of attendees to 500 — double what we

Source:: Cisco Security Notice

Talos’ Malware Year in Review

By Talos Group It was easy to see a wild year coming in cybersecurity. It started with a bang, with Olympic Destroyer targeting the Winter Olympics in February in an attempt to disrupt

Source:: Cisco Security Notice

Cisco ISE – Playing Nice in the Security Ecosystem

By Eddie Mendonca 2005 has long come and gone, and in this day and age, segmenting traffic on your network should mean more than a separate voice and data VLAN.

Source:: Cisco Security Notice

Three ways to detect cryptomining activities using network security analytics

By Matthew Robertson Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process

Source:: Cisco Security Notice

Vulnerability Spotlight : Multiple Vulnerabilities in WIBU-SYSTEMS WibuKey.sys

By Talos Group These vulnerabilities were discovered by Marcin ‚Icewall‘ Noga of Cisco Talos. Executive Summary WibuKey is a Digital Rights Management (DRM) solution

Source:: Cisco Security Notice